Archived
files |
Chapter_6-Entra_ID_User_and_Group_Management\38. Section outline.mp4
[1f243e44614c3e6b]
|
8,031,249 |
8CE4F9FE |
Chapter_6-Entra_ID_User_and_Group_Management\39. Types of users in Entra ID.mp4
[ea76a0a7cc523c65]
|
12,329,825 |
13C54726 |
Chapter_6-Entra_ID_User_and_Group_Management\40. Discuss Entra ID users use cases.mp4
[d33e10b610b996c2]
|
26,239,609 |
1C93C614 |
Chapter_6-Entra_ID_User_and_Group_Management\41. Types of Entra ID groups and use cases.mp4
[9369ff423ea5100d]
|
16,297,668 |
9DE8EF37 |
Chapter_6-Entra_ID_User_and_Group_Management\42. Discuss Entra ID group membership types.mp4
[1f1ad804a466192b]
|
25,291,331 |
DC0484C6 |
Chapter_6-Entra_ID_User_and_Group_Management\43. What are user and group properties.mp4
[7282fff2661d815d]
|
28,771,964 |
A4F96CA4 |
Chapter_6-Entra_ID_User_and_Group_Management\44. Bulk operation in Entra ID.mp4
[24604ed0fb3a2b4e]
|
9,350,820 |
1AF670A3 |
Chapter_6-Entra_ID_User_and_Group_Management\45. Discuss built-in Entra ID and Azure resource roles.mp4
[211391f62e12a17b]
|
20,256,099 |
7C967503 |
Chapter_6-Entra_ID_User_and_Group_Management\46. Discuss Entra ID and Azure resource's role assignment.mp4
[9e08599664a2b49f]
|
23,058,023 |
F8DD6A7C |
Chapter_6-Entra_ID_User_and_Group_Management\47. What is administrative units and its use cases.mp4
[9e6a7450b8ca315b]
|
41,619,226 |
878EF798 |
Chapter_6-Entra_ID_User_and_Group_Management\48. Demo - Create local users, Service Principal, External user and Managed Identity.mp4
[5971b26cc6c82cfd]
|
67,145,114 |
BBD1CE21 |
Chapter_6-Entra_ID_User_and_Group_Management\49. Demo - Create different Entra ID Groups.mp4
[bdd45c4fff89d1b8]
|
20,979,696 |
F28A31D2 |
Chapter_6-Entra_ID_User_and_Group_Management\50. Demo - User and Group properties.mp4
[67be0a279e5f24ce]
|
43,091,462 |
78773B1B |
Chapter_6-Entra_ID_User_and_Group_Management\51. Demo - Identify and Assign Entra ID and Azure resource roles.mp4
[88812619a67e2b68]
|
144,546,622 |
26AF4F20 |
Chapter_6-Entra_ID_User_and_Group_Management\52. Demo - Create users using bulk operation.mp4
[584aaa6e4dea21d1]
|
39,844,880 |
8870C28D |
Chapter_6-Entra_ID_User_and_Group_Management\53. Demo - Create admin unit and assign users.mp4
[77791bdd1b41dfa3]
|
16,527,482 |
3A190B43 |
Chapter_6-Entra_ID_User_and_Group_Management\Additional_Files\Entra+ID+user+and+group+management.pdf |
491,629 |
8F085790 |
Chapter_7-Hybrid_Identity_Management\54. Section outline.mp4
[43484018cfa30436]
|
10,839,901 |
D5199557 |
Chapter_7-Hybrid_Identity_Management\55. Hybrid identity and authentication method.mp4
[2c7d668f8794d897]
|
19,639,660 |
C066DA9D |
Chapter_7-Hybrid_Identity_Management\56. What is Microsoft Entra Connect.mp4
[e0d72e80d240e4d1]
|
20,965,917 |
4629EB46 |
Chapter_7-Hybrid_Identity_Management\57. Pre-requisite for Connect Sync and Cloud Sync.mp4
[cc23336ab4d8fb40]
|
29,453,526 |
62C55A20 |
Chapter_7-Hybrid_Identity_Management\58. Entra domain services and use cases.mp4
[daa91efa25aa6331]
|
27,196,390 |
14946F6D |
Chapter_7-Hybrid_Identity_Management\59. Explore IdFix Tool.mp4
[6576581e9b66177]
|
7,043,422 |
736E3192 |
Chapter_7-Hybrid_Identity_Management\60. Demo - Install Active Directory Domain Services.mp4
[9907dec108c336dc]
|
49,481,176 |
10CB749A |
Chapter_7-Hybrid_Identity_Management\61. Demo - Prepare AD DS for Entra ID sync using IdFix.mp4
[b96626f561d4830d]
|
30,150,279 |
62E7947D |
Chapter_7-Hybrid_Identity_Management\62. Demo - Implement Cloud Sync.mp4
[2d6edbd35052543f]
|
108,316,518 |
18D90470 |
Chapter_7-Hybrid_Identity_Management\63. Demo - Implement Connect Sync.mp4
[cc650dcb6ffeba38]
|
33,057,607 |
687CD2E8 |
Chapter_7-Hybrid_Identity_Management\64. Demo - Real use case- Implement Entra Domain Services.mp4
[e67578ad39c46e3]
|
112,878,717 |
90FC37C3 |
Chapter_7-Hybrid_Identity_Management\Additional_Files\Hybrid+identity+management.pdf |
306,724 |
4CAD10B6 |
Chapter_8-Identity_Protection\65. Section outline.mp4
[d5f59a913f73b04c]
|
13,100,783 |
7479DDB0 |
Chapter_8-Identity_Protection\66. Multi Factor Authentication and how it works in Entra ID.mp4
[d1d35cb17da3b0ab]
|
24,074,312 |
1CD31F7E |
Chapter_8-Identity_Protection\67. Self-service password reset and how it works in Entra ID.mp4
[1b20b781ab67c110]
|
53,098,865 |
F24C01CE |
Chapter_8-Identity_Protection\68. Authentication and verification methods in Entra ID.mp4
[629e745e493db52e]
|
36,162,101 |
5327A9A4 |
Chapter_8-Identity_Protection\69. What is conditional access and its importance.mp4
[6ceb1ba506dbd840]
|
32,043,490 |
B10D1DFB |
Chapter_8-Identity_Protection\70. Best practices for designing Conditional Access.mp4
[eab9035d29457df6]
|
23,748,302 |
BA5709DD |
Chapter_8-Identity_Protection\71. Design conditional access policies.mp4
[eeb69bfa1371184c]
|
49,732,476 |
25E73EE0 |
Chapter_8-Identity_Protection\72. Discuss Conditional Access authentication strength.mp4
[15dfd3017c8a6faa]
|
52,090,867 |
450D1D2A |
Chapter_8-Identity_Protection\73. Demo – Implement SSPR.mp4
[71ce750f826fbe00]
|
70,048,915 |
72CF5B34 |
Chapter_8-Identity_Protection\74. Demo – Implement conditional access policies.mp4
[aebfe43d6408839f]
|
66,716,600 |
7EDA0C9D |
Chapter_8-Identity_Protection\75. Demo – Review of authentication methods.mp4
[3f0535d773b8378c]
|
51,900,851 |
0B2AEE2B |
Chapter_8-Identity_Protection\Additional_Files\Azure-Platform-Tenant-Conditional-Access-Policies++-build+specification.xlsx |
23,219 |
9FA2AD1E |
Chapter_8-Identity_Protection\Additional_Files\Identity+Protection.pdf |
756,421 |
58386600 |
Chapter_9-Identity_Governance\76. Section outline.mp4
[bb629c26719bc26]
|
11,089,286 |
67DFD267 |
Chapter_9-Identity_Governance\77. What is Identity Governance and its importance.mp4
[2a93b2314a0d6a28]
|
25,207,761 |
2DA8E7A8 |
Chapter_9-Identity_Governance\78. Discuss Azure PIM and its features.mp4
[52d22d89d3b6d852]
|
28,922,612 |
160F9DB8 |
Chapter_9-Identity_Governance\79. What is Entitlement Management and how it works.mp4
[edf8a40530885994]
|
43,648,225 |
621C44D0 |
Chapter_9-Identity_Governance\80. Explain Access review and when to use it.mp4
[a5449479b63141ea]
|
31,288,502 |
8A3E5649 |
Chapter_9-Identity_Governance\81. Use Case - Problem statements for role management.mp4
[5843833813be0539]
|
27,838,067 |
ECD4A031 |
Chapter_9-Identity_Governance\82. Design Entra and Azure RBAC solution.mp4
[1fef876d695128e3]
|
91,219,320 |
D4C43004 |
Chapter_9-Identity_Governance\83. Demo - Implement Azure PIM - Tenant Administrator.mp4
[50540dfd8d8c04ce]
|
142,148,433 |
4A86856C |
Chapter_9-Identity_Governance\84. Demo - Create Access review - Cloud Engineer.mp4
[f0a9f0987edb4c54]
|
119,913,646 |
5F411654 |
Chapter_9-Identity_Governance\85. Demo - Create Catalog and Access Package - Security Administrator.mp4
[59138ef21b1a0cfd]
|
122,307,996 |
941C3D7C |
Chapter_9-Identity_Governance\86. Demo - Role readability for operational excellence.mp4
[28688c802aee117a]
|
189,471,427 |
0B82D0C0 |
Chapter_9-Identity_Governance\87. Demo - Create service principal and discuss PIM limitations.mp4
[bb9ae487c20eb367]
|
27,456,930 |
8001604C |
Chapter_9-Identity_Governance\Additional_Files\Demo+-+build-specification-for-access-review.xlsx |
19,233 |
4A14B924 |
Chapter_9-Identity_Governance\Additional_Files\Design-RBAC-Model-and-integrate-with-PIM.xlsx |
27,210 |
697AF3AE |
Chapter_9-Identity_Governance\Additional_Files\Entitlement-Management-Catalog-and-AccessPackages.xlsx |
23,954 |
25CBA3FA |
Chapter_9-Identity_Governance\Additional_Files\Identity+Governance.pdf |
239,081 |
5A9E82D4 |
Chapter_10-Workload_Identities\88. Section outline.mp4
[a236bd5968e1f6cb]
|
6,528,345 |
6324DEF5 |
Chapter_10-Workload_Identities\89. What are workload identities.mp4
[1b1aad1325802d81]
|
21,634,751 |
096955E8 |
Chapter_10-Workload_Identities\90. Why to secure workload identities.mp4
[691ff6b120910814]
|
42,497,799 |
42C971D1 |
Chapter_10-Workload_Identities\91. What are Managed Identities (MI) and its type.mp4
[27fb32532e87263]
|
25,077,864 |
45F4C7A0 |
Chapter_10-Workload_Identities\92. WI protection using conditional access.mp4
[55665d8e79e764eb]
|
12,089,694 |
F4824306 |
Chapter_10-Workload_Identities\93. Discuss Workload Identity Federation.mp4
[b773f427956f6591]
|
36,928,065 |
557D9D72 |
Chapter_10-Workload_Identities\94. Demo - System assigned managed identity.mp4
[2853b593c3cb0203]
|
39,011,388 |
E2B4803E |
Chapter_10-Workload_Identities\95. Demo - User assigned managed identity.mp4
[e783cf8fb3956dd0]
|
56,036,487 |
C1C8B842 |
Chapter_10-Workload_Identities\96. Demo - Workload identity federation with GitHub.mp4
[da07d020f7292ada]
|
78,557,371 |
3F254FFE |
Chapter_11-B2C_and_B2B_Identity_Solution\100. Secure Azure AD B2C solution.mp4
[7970906aea7037b9]
|
16,362,021 |
20B9E9D0 |
Chapter_11-B2C_and_B2B_Identity_Solution\101. Explore Microsoft Entra Tenant types and comparison.mp4
[a6efe45c166304d9]
|
9,333,865 |
450085EF |
Chapter_11-B2C_and_B2B_Identity_Solution\102. Types of tenant in Entra ID and its use cases.mp4
[68a726321506d7c6]
|
26,171,570 |
E2392C5D |
Chapter_11-B2C_and_B2B_Identity_Solution\103. Demo - Create Azure AD B2C Tenant and userflow.mp4
[a9b227ce22bfbec0]
|
50,280,035 |
33BAEA52 |
Chapter_11-B2C_and_B2B_Identity_Solution\104. Demo - Create External ID Tenant and userflow.mp4
[6f5549266d44268a]
|
64,934,281 |
77329F7B |
Chapter_11-B2C_and_B2B_Identity_Solution\105. Demo - Onboard Google as an IdP to Entra External ID tenant.mp4
[ce66fa02d3eba73a]
|
82,864,281 |
D02506B6 |
Chapter_11-B2C_and_B2B_Identity_Solution\97. Section outline.mp4
[9dca4011ea06981e]
|
7,709,492 |
CE8D507D |
Chapter_11-B2C_and_B2B_Identity_Solution\98. What is Azure AB B2C.mp4
[f85ddc4d9ecf29e]
|
40,700,448 |
7FCC13DB |
Chapter_11-B2C_and_B2B_Identity_Solution\99. Azure AB B2C recommendation and best practices.mp4
[fce0abd45240303b]
|
15,674,486 |
2AAFF79A |
Chapter_11-B2C_and_B2B_Identity_Solution\Additional_Files\B2C+and+B2B+Identity+solution.pdf |
519,829 |
A3C428F7 |
Chapter_12-Application_Management\106. Section outline.mp4
[82a576d74100ff37]
|
2,848,037 |
E07AE5A5 |
Chapter_12-Application_Management\107. Application management in Entra ID.mp4
[ee762476bde7e1a7]
|
28,229,175 |
07E61B8F |
Chapter_12-Application_Management\108. Application proxy and its use cases.mp4
[935589387a7eb250]
|
23,874,540 |
CCD17571 |
Chapter_12-Application_Management\109. What is SCIM and application provisioning.mp4
[212d0193994154fe]
|
28,347,582 |
7033AD62 |
Chapter_12-Application_Management\110. Demo - Microsoft Entra SAML toolkit application onboarding and SSO test.mp4
[1d67a49af759d767]
|
150,819,273 |
9E6AEA4F |
Chapter_12-Application_Management\Additional_Files\Application+Management.pdf |
221,559 |
A04C0E42 |
Chapter_13-Microsoft_Verified_ID\111. Section outline.mp4
[d9a211467127ecc9]
|
4,886,107 |
C06A8E08 |
Chapter_13-Microsoft_Verified_ID\112. Discuss current problems with identities.mp4
[ea0f4a542bcf5ead]
|
25,686,526 |
3F0ECB3B |
Chapter_13-Microsoft_Verified_ID\113. Decentralized identity and why we need one.mp4
[386540d4d6291a8]
|
31,473,199 |
13DDD9C3 |
Chapter_13-Microsoft_Verified_ID\114. DID Standards.mp4
[5a29220df60ca3b]
|
36,202,188 |
A107E51B |
Chapter_13-Microsoft_Verified_ID\115. What is Microsoft Verified ID.mp4
[7b192fec9793d8ff]
|
41,433,882 |
7C935976 |
Chapter_13-Microsoft_Verified_ID\116. How Microsoft Entra Verified ID works.mp4
[3efce9fbad90977e]
|
30,495,388 |
D3F762C4 |
Chapter_13-Microsoft_Verified_ID\117. Discuss Quick setup configuration in Verified ID.mp4
[25e57614d36a83cf]
|
13,502,853 |
437D9915 |
Chapter_13-Microsoft_Verified_ID\118. Discuss Advanced setup configuration in Verified ID.mp4
[8711b92783404c08]
|
19,301,653 |
E635D34C |
Chapter_13-Microsoft_Verified_ID\119. Demo - Set up Verified ID and test using sample application.mp4
[a29bac4106586268]
|
107,392,691 |
FE6953B1 |
Chapter_13-Microsoft_Verified_ID\Additional_Files\Microsoft+Verified+ID.pdf |
544,655 |
C1535C9B |
Chapter_14-Permission_Management\120. Section outline.mp4
[9f59559af369371b]
|
5,268,882 |
942592A4 |
Chapter_14-Permission_Management\121. Discuss multi-cloud access management problems.mp4
[5614ed16fd062ad7]
|
35,091,987 |
9FBE7F41 |
Chapter_14-Permission_Management\122. Pre-requisite for Permission Management.mp4
[f1eaf2e8d94e2f4e]
|
8,814,030 |
311EF781 |
Chapter_14-Permission_Management\123. What is Permission Management and its use case.mp4
[4c03ec3a2625e291]
|
23,604,621 |
DD041341 |
Chapter_14-Permission_Management\124. Discuss key terms used in Permission Management.mp4
[f7d85182493c3183]
|
24,898,744 |
6965726F |
Chapter_14-Permission_Management\125. Steps to onboard Azure to Permission Management.mp4
[3929aee166e5c858]
|
9,216,005 |
8E37422E |
Chapter_14-Permission_Management\126. Steps to onboard AWS to Permission Management.mp4
[4fd2e331ef536fa4]
|
12,494,819 |
2B5733F2 |
Chapter_14-Permission_Management\127. Steps to onboard Google to Permission Management.mp4
[f7b0b18ef54f855e]
|
12,367,325 |
5ED03FBA |
Chapter_14-Permission_Management\128. Demo - Configure Permission Management for Azure.mp4
[d62d5a6774f079ae]
|
107,343,827 |
8668AD17 |
Chapter_14-Permission_Management\Additional_Files\Permission+Management.pdf |
627,058 |
5D8DCB21 |
Chapter_15-Global_Secure_Access\129. Section outline.mp4
[e49740375d42f7]
|
6,584,610 |
B5A54DA4 |
Chapter_15-Global_Secure_Access\130. What is Secure Access Service Edge.mp4
[4eb56e25e359737d]
|
35,544,260 |
D1B0CDBA |
Chapter_15-Global_Secure_Access\131. What is Secure Service Edge.mp4
[3e734a58deca4626]
|
11,261,335 |
E7F644B5 |
Chapter_15-Global_Secure_Access\132. What is Global Secure Access.mp4
[2f18c514294b35b3]
|
32,491,054 |
697CBA5F |
Chapter_15-Global_Secure_Access\133. Global Secure Access clients.mp4
[de14f2c02e9d120a]
|
8,737,579 |
F65656DC |
Chapter_15-Global_Secure_Access\134. Remote network connectivity to GSA.mp4
[6cb4a3dd02d31df]
|
13,121,249 |
0E37A822 |
Chapter_15-Global_Secure_Access\135. Demo - Configure GSA for M365 traffic.mp4
[866c728bc0f9b23e]
|
122,155,134 |
3C62E521 |
Chapter_15-Global_Secure_Access\136. Demo - Configure GSA for internet access.mp4
[f7283af380b0f4f]
|
76,863,626 |
DAC66397 |
Chapter_15-Global_Secure_Access\Additional_Files\Global+Secure+Access.pdf |
430,156 |
B9D05C8F |
Chapter_16-Entra_ID_Monitoring\137. Section outline.mp4
[ad336ce7b7bc910]
|
6,014,013 |
98CF5B90 |
Chapter_16-Entra_ID_Monitoring\138. Explore various logs available in Entra ID.mp4
[709244a1569b84c1]
|
17,546,205 |
731F3C7C |
Chapter_16-Entra_ID_Monitoring\139. Discuss Entra ID log destination and use cases.mp4
[bdfb1b1b48e66fd0]
|
32,708,854 |
D20AACFF |
Chapter_16-Entra_ID_Monitoring\140. Essentials of log analytics workspace and KQL.mp4
[ad6df295fdac4f54]
|
20,527,972 |
0D83AEA9 |
Chapter_16-Entra_ID_Monitoring\141. What is Action Group and its use cases.mp4
[3206236f9125934]
|
20,466,644 |
69A6AA49 |
Chapter_16-Entra_ID_Monitoring\142. Design Entra ID monitoring solution.mp4
[2c1652934e5196fb]
|
39,950,410 |
27671699 |
Chapter_16-Entra_ID_Monitoring\143. Microsoft Defender XDR and Entra ID integration.mp4
[1688632243170f23]
|
13,903,031 |
861E81D5 |
Chapter_16-Entra_ID_Monitoring\144. Demo - Implement Entra ID log monitoring solution.mp4
[c6631f40ecc80425]
|
72,737,021 |
C49F5374 |
Chapter_16-Entra_ID_Monitoring\145. Demo - Implement alerting using Kusto query.mp4
[2ae37c76d5b20a9]
|
39,429,934 |
93CB2551 |
Chapter_16-Entra_ID_Monitoring\Additional_Files\Entra+ID+Monitoring.pdf |
361,680 |
A3EC8C53 |
Chapter_1-Introduction\1. About course.mp4
[882a68e081ea4588]
|
61,066,809 |
5A6674CB |
Chapter_1-Introduction\2. Sign-up to Azure.mp4
[55609cfa0353345d]
|
16,998,064 |
D84FEA61 |
Chapter_1-Introduction\3. Essential licensing considerations.mp4
[b4ca9a576655f7a8]
|
12,160,450 |
60F2C535 |
Chapter_1-Introduction\Additional_Files\Introduction.pdf |
188,507 |
FB446EA1 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\10. What is Microsoft Entra ID.mp4
[8d0da3c47abfc19a]
|
20,964,090 |
A1BD6A69 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\11. Microsoft Entra ID features.mp4
[89185fa39529d902]
|
12,694,825 |
82D8A56A |
Chapter_2-Microsoft_Entra_ID_Fundamentals\12. Entra ID trust relationship with subscriptions.mp4
[bf95e56af7d98c07]
|
13,590,541 |
E5F208C3 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\13. Compare Entra ID and AD DS.mp4
[2da063a08f9a6140]
|
14,670,605 |
1BC3775E |
Chapter_2-Microsoft_Entra_ID_Fundamentals\4. Section Objectives.mp4
[fc6b70943b696aa2]
|
4,735,055 |
92F28D38 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\5. Key terms in identity solutions.mp4
[ce01d59c25989043]
|
16,689,720 |
09BEDE55 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\6. Who are Identity Providers (IdP).mp4
[7494c93c1e46f18d]
|
16,154,937 |
4DFE3000 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\7. What is an IAM.mp4
[cbddbb994014234d]
|
17,732,357 |
AA37F2F1 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\8. How IAM works.mp4
[eac52d713fb8000b]
|
14,271,539 |
31B95B5C |
Chapter_2-Microsoft_Entra_ID_Fundamentals\9. Authentication and authorization standards.mp4
[e3c47c46fd15a485]
|
22,279,814 |
C3E202D5 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\Additional_Files\Microsoft+Entra+ID+Fundamentals.pdf |
445,760 |
FA9B9BC8 |
Chapter_3-Enhance_your_User_Experience\14. Section outline.mp4
[ad189dc644499be1]
|
10,436,752 |
E4C0605D |
Chapter_3-Enhance_your_User_Experience\15. Entra ID default and custom domain name.mp4
[d70a2175223bd56b]
|
15,433,983 |
6EDA7B5C |
Chapter_3-Enhance_your_User_Experience\16. Benefits of Entra ID custom domain name.mp4
[8d095b15e8af9c6f]
|
13,218,228 |
4C388CC3 |
Chapter_3-Enhance_your_User_Experience\17. Common domain verification issues.mp4
[3fbb35f8e8d6ae6]
|
15,254,897 |
23F72629 |
Chapter_3-Enhance_your_User_Experience\18. Company branding.mp4
[d5ca82358bc3567c]
|
27,196,230 |
BCD1ADB9 |
Chapter_3-Enhance_your_User_Experience\19. Real world use case - Empower branding team to maintain company branding.mp4
[2e517b4fee465718]
|
11,187,918 |
EE6DB9A1 |
Chapter_3-Enhance_your_User_Experience\20. Demo - real world example - add a custom domain.mp4
[a02053ef99fdb117]
|
20,588,578 |
DED1AE8E |
Chapter_3-Enhance_your_User_Experience\21. Demo - real world example - company branding.mp4
[102a41a0fa61e03b]
|
50,397,057 |
1CCF35F6 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\22. Section outline.mp4
[95d2c5d6d056f88e]
|
10,051,914 |
201F00E4 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\23. Default user permissions and how to restrict.mp4
[4ea3de0d053eb6b4]
|
26,023,666 |
787C6A27 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\24. Review and correct default group settings.mp4
[8104488b903df4bd]
|
22,993,188 |
9EE0ABFE |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\25. Review and correct external collaboration settings.mp4
[d07b5dde47605de9]
|
30,974,260 |
3DE7A4E0 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\26. What are security defaults in Entra ID.mp4
[dfe11e05a7aeed1e]
|
24,503,879 |
0B50CB71 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\27. Design Entra ID tenant emergency access strategy.mp4
[9663185eb1a71a91]
|
14,037,211 |
71AE1B2D |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\28. Demo - fix user, group and external collaboration settings.mp4
[7153b9682dd569e0]
|
60,913,564 |
C6EBA5B8 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\29. Demo - Security defaults enable and disable.mp4
[5d83a2aa63fac2db]
|
15,392,839 |
666F2B72 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security\30. Demo - Create and set up emergency access account.mp4
[65308b8b4c54e979]
|
46,648,109 |
4B941E0A |
Chapter_5-Entra_ID_License_Management\31. Section outline.mp4
[5fd784a327b7b59e]
|
4,168,236 |
5F9176AB |
Chapter_5-Entra_ID_License_Management\32. Explore Entra ID editions and license.mp4
[a06a8fb497e8fb99]
|
13,896,039 |
57E22C93 |
Chapter_5-Entra_ID_License_Management\33. User license management consideration.mp4
[da92ff8b859f56d0]
|
14,199,205 |
2A10FBDA |
Chapter_5-Entra_ID_License_Management\34. Group based licensing limitations.mp4
[57a8794dbeb70e75]
|
28,961,807 |
2D0B109F |
Chapter_5-Entra_ID_License_Management\35. Demo - Assign licenses to Entra ID tenant.mp4
[5fb29fe142898e87]
|
22,762,748 |
750EF6CC |
Chapter_5-Entra_ID_License_Management\36. Demo - Assign license to user and group.mp4
[dce91e6fc33af6b1]
|
40,202,857 |
09E6BC70 |
Chapter_5-Entra_ID_License_Management\37. Demo - Use Case - License admin and license usage monitoring.mp4
[ff9b32f0b03d66f3]
|
76,476,258 |
34729F30 |
Chapter_6-Entra_ID_User_and_Group_Management\Additional_Files |
0 |
00000000 |
Chapter_7-Hybrid_Identity_Management\Additional_Files |
0 |
00000000 |
Chapter_8-Identity_Protection\Additional_Files |
0 |
00000000 |
Chapter_9-Identity_Governance\Additional_Files |
0 |
00000000 |
Chapter_11-B2C_and_B2B_Identity_Solution\Additional_Files |
0 |
00000000 |
Chapter_12-Application_Management\Additional_Files |
0 |
00000000 |
Chapter_13-Microsoft_Verified_ID\Additional_Files |
0 |
00000000 |
Chapter_14-Permission_Management\Additional_Files |
0 |
00000000 |
Chapter_15-Global_Secure_Access\Additional_Files |
0 |
00000000 |
Chapter_16-Entra_ID_Monitoring\Additional_Files |
0 |
00000000 |
Chapter_1-Introduction\Additional_Files |
0 |
00000000 |
Chapter_2-Microsoft_Entra_ID_Fundamentals\Additional_Files |
0 |
00000000 |
Chapter_6-Entra_ID_User_and_Group_Management |
0 |
00000000 |
Chapter_7-Hybrid_Identity_Management |
0 |
00000000 |
Chapter_8-Identity_Protection |
0 |
00000000 |
Chapter_9-Identity_Governance |
0 |
00000000 |
Chapter_10-Workload_Identities |
0 |
00000000 |
Chapter_11-B2C_and_B2B_Identity_Solution |
0 |
00000000 |
Chapter_12-Application_Management |
0 |
00000000 |
Chapter_13-Microsoft_Verified_ID |
0 |
00000000 |
Chapter_14-Permission_Management |
0 |
00000000 |
Chapter_15-Global_Secure_Access |
0 |
00000000 |
Chapter_16-Entra_ID_Monitoring |
0 |
00000000 |
Chapter_1-Introduction |
0 |
00000000 |
Chapter_2-Microsoft_Entra_ID_Fundamentals |
0 |
00000000 |
Chapter_3-Enhance_your_User_Experience |
0 |
00000000 |
Chapter_4-Establish_Basic_Entra_ID_tenant_Security |
0 |
00000000 |
Chapter_5-Entra_ID_License_Management |
0 |
00000000 |
|
Total size: |
5,176,817,362 |
|
|